Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge

被引:0
|
作者
Bock, Estuardo Alpirez [1 ]
Treff, Alexander [2 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] Univ Lubeck, Lubeck, Germany
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020) | 2021年 / 12244卷
关键词
White-box cryptography; Capture the flag; Differential computation analysis; Differential fault analysis; CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1007/978-3-030-68773-1_7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2017, the first CHES Capture the Flag Challenge was organized in an effort to promote good design candidates for white-box cryptography. In particular, the challenge assessed the security of the designs with regard to key extraction attacks. A total of 94 candidate programs were submitted, and all of them were broken eventually. Even though most candidates were broken within a few hours, some candidates remained robust against key extraction attacks for several days, and even weeks. In this paper, we perform a qualitative analysis on all candidates submitted to the CHES 2017 Capture the Flag Challenge. We test the robustness of each challenge against different types of attacks, such as automated attacks, extensions thereof and reverse engineering attacks. We are able to classify each challenge depending on their robustness against these attacks, highlighting how challenges vulnerable to automated attacks can be broken in a very short amount of time, while more robust challenges demand for big reverse engineering efforts and therefore for more time from the adversaries. Besides classifying the robustness of each challenge, we also give data regarding their size and efficiency and explain how some of the more robust challenges could actually provide acceptable levels of security for some real-life applications.
引用
收藏
页码:123 / 146
页数:24
相关论文
共 9 条
  • [1] On Security of a White-Box Implementation of SHARK
    Shi, Yang
    Fan, Hongfei
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 455 - 471
  • [2] On the security goals of white-box cryptography
    Bock E.A.
    Amadori A.
    Brzuska C.
    Michiels W.
    1600, Ruhr-University of Bochum (2020): : 327 - 357
  • [3] White-Box Security Notions for Symmetric Encryption Schemes
    Delerablee, Cecile
    Lepoint, Tancrede
    Paillier, Pascal
    Rivain, Matthieu
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 247 - 264
  • [4] White-Box Cryptography: Security in an Insecure Environment
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    IEEE SECURITY & PRIVACY, 2016, 14 (05) : 88 - 92
  • [5] Towards Security Notions for White-Box Cryptography
    Saxena, Amitabh
    Wyseur, Brecht
    Preneel, Bart
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 49 - +
  • [6] On Provable White-Box Security in the Strong Incompressibility Model
    Bock E.A.
    Brzuska C.
    Lai R.W.F.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 167 - 187
  • [7] Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm
    Lin, Tingting
    Yan, Hailun
    Lai, Xuejia
    Zhong, Yixin
    Jia, Yin
    COMPUTER JOURNAL, 2018, 61 (12): : 1783 - 1790
  • [8] UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication
    Chen X.
    Yang B.
    Zhu J.
    Liu J.
    Yin S.
    Yang G.
    Zhu M.
    Wei S.
    Liu L.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 677 - 713
  • [9] Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
    Bang, A. O.
    Rao, Udai Pratap
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 11111 - 11137